Computer Science ›› 2021, Vol. 48 ›› Issue (6A): 504-508.doi: 10.11896/jsjkx.200700210
• Information Security • Previous Articles Next Articles
WANG Xiang-yu1, YANG Ting2
CLC Number:
[1] HE D,ZEADALLY S,KUMAR N,et al.Anonymous Authentication for Wireless Body Area Networks With Provable Security[J].IEEE Systems Journal,2017,11(4):2590-2601. [2] CATALANO D,FIORE D,GENNARO R.A certificateless approach to onion routing[J].International Journal of Information Security,2017,16(3):327-343. [3] LIU X,WANG N.An overview of anonymous communication[J].Computer Applications,2010,30(3):719-722. [4] TAN Q,GAO Y,SHI J,et al.Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services[J].IEEE Internet of Things Journal,2019,6(2):1584-1593. [5] CHRISTIDIS K,DEVETSIKIOTIS M.Blockchains and SmartContracts for the Internet of Things[J].IEEE Access,2016,4:2292-2303. [6] HAMOUID K,ADI K.Secure and reliable certification management scheme for large-scale MANETs based on a distributed anonymous authority[J].Peer-to-Peer Networking and Applications,2019,12(5):1137-1155. [7] HAGHIGHI M S,AZIMINEJAD Z.Highly Anonymous Mobility-Tolerant Location-Based Onion Routing for VANETs[J].IEEE Internet of Things Journal,2020,7(4):2582-2590. [8] TSAI J L,LO N W.Secure Anonymous Key DistributionScheme for Smart Grid[J].IEEE Transactions on Smart Grid,2016,7(2):906-914. [9] RAHMAN M A,HOSSAIN M S,LOUKAS G,et al.Block-chain-based Mobile Edge Computing Framework for Secure Therapy Applications[J].IEEE Access,2018(99):1-1. [10] ZHUMABEKULY AITZHAN N,SVETINOVIC D.Securityand Privacy in Decentralized Energy Trading Through Multi-Signatures,Blockchain and Anonymous Messaging Streams[J].IEEE Transactions on Dependable and Secure Computing,2018,15(5):840-852. [11] WAN S.Topology hiding routing based on learning with errors[J].Concurrency and Computation:Practice and Experience,2020,e5740. [12] SAKAI K,SUN M T,KU W S,et al.On Anonymous Routing in Delay Tolerant Networks[J].IEEE Transactions on Mobile Computing,2019,18(12):2926-2940. [13] ZHAO K,XING Y H.Overview of research on security of the Internet of Things driven by blockchain technology [J].Information Network Security,2017(5):1-6. [14] KANG J,YU R,HUANG X,et al.Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains[J].IEEE Transactions on Industrial Informatics,2017(6):1-1. [15] LEI A,CRUICKSHANK H,CAO Y,et al.Blockchain-BasedDynamic Key Management for Heterogeneous Intelligent Transportation Systems[J].IEEE Internet of Things Journal,2017(99):1-1. [16] MAXWELL G,POELSTRA A,SEURIN Y,et al.SimpleSchnorr multi-signatures with applications to Bitcoin[J].Designs,Codes and Cryptography,2019,87(9). [17] ZOU B.Summary of Auction Theory[J].Science Consulting (Technology·Management),2013(11):19-20. [18] LEI A,CRUICKSHANK H,CAO Y,et al.Blockchain-BasedDynamic Key Management for Heterogeneous Intelligent Transportation Systems[J].IEEE Internet of Things Journal,2017(99):1-1. [19] MESHRAM C,LEE C C,LI C T,et al.A secure key authentication scheme for cryptosystems based on GDLP and IFP[J].Soft Computing,2016,21(24):7285-7291. [20] CHEN Z,QI F,YE C Y.Research on a cloud data encryption scheme based on national secret algorithm[J].Information Security Research,2018,4(7):646-651. [21] HE D,ZEADALLY S,KUMAR N,et al.Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures[J].IEEE Transactions on Information Forensics & Security,2016,11(9):2052-2064. [22] YAGHMAEE M H,BARABADI B,ALISHAHI S,et al.Incentive cloud-based demand response program using game theory in smart grid[C]// Electrical Power Distribution Networks Conference.IEEE,2016. |
[1] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[2] | HUANG Song, DU Jin-hu, WANG Xing-ya, SUN Jin-lei. Survey of Ethereum Smart Contract Fuzzing Technology Research [J]. Computer Science, 2022, 49(8): 294-305. |
[3] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[4] | GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468. |
[5] | WEI Hong-ru, LI Si-yue, GUO Yong-hao. Secret Reconstruction Protocol Based on Smart Contract [J]. Computer Science, 2022, 49(6A): 469-473. |
[6] | DU Hui, LI Zhuo, CHEN Xin. Incentive Mechanism for Hierarchical Federated Learning Based on Online Double Auction [J]. Computer Science, 2022, 49(3): 23-30. |
[7] | ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61. |
[8] | GUO Xian, WANG Yu-yue, FENG Tao, CAO Lai-cheng, JIANG Yong-bo, ZHANG Di. Blockchain-based Role-Delegation Access Control for Industrial Control System [J]. Computer Science, 2021, 48(9): 306-316. |
[9] | GUO Shang-tong, WANG Rui-jin, ZHANG Feng-li. Summary of Principle and Application of Blockchain [J]. Computer Science, 2021, 48(2): 271-281. |
[10] | CHEN Zi-min, LU Yi-wen, GUO Yan. High-speed Replay of Ethereum Smart Contracts Based on Block Parallel [J]. Computer Science, 2021, 48(2): 289-294. |
[11] | WANG Hui, CHEN Bo, LIU Yu-xiang. Research on Personnel File Management System Based on Blockchain [J]. Computer Science, 2021, 48(11A): 713-718. |
[12] | DAI Chuang-chuang, LUAN Hai-jing, YANG Xue-ying, GUO Xiao-bing, LU Zhong-hua, NIU Bei-fang. Overview of Blockchain Technology [J]. Computer Science, 2021, 48(11A): 500-508. |
[13] | LING Fei, CHEN Shi-ping. Shared Digital Credits Management Mechanism of Enterprise Alliance Based on Blockchain [J]. Computer Science, 2021, 48(11A): 533-539. |
[14] | TU Liang-qiong, SUN Xiao-bing, ZHANG Jia-le, CAI Jie, LI Bin, BO Li-li. Survey of Vulnerability Detection Tools for Smart Contracts [J]. Computer Science, 2021, 48(11): 79-88. |
[15] | XIAO Feng, ZHANG Peng-cheng, LUO Xia-pu. Ethereum Smart Contract Bug Detection and Repair Approach Based on Regular Expressions, Program Instrumentation and Code Replacement [J]. Computer Science, 2021, 48(11): 89-101. |
|